G. Bai, L. Gu, T. Feng, Y. Guo, and X. Chen, Context-Aware Usage Control for Android, Security and Privacy in Communication Networks, pp.326-343, 2010.
DOI : 10.1145/1108906.1108908

G. Bal, Revealing Privacy-Impacting Behavior Patterns of Smartphone Applications (Short Paper) In: MoST 2012 -Proceedings of the Mobile Security Technologies Workshop 2012, 2012.

A. R. Beresford, A. Rice, N. Sohan, N. Skehin, and R. Sohan, MockDroid, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, 2011.
DOI : 10.1145/2184489.2184500

C. Bravo-lillo, L. Cranor, J. Downs, S. Komanduri, M. Sleeper et al., Improving Computer Security Dialogs, Lecture Notes in Computer Science, vol.6949, pp.18-35, 2011.
DOI : 10.1007/978-3-642-23768-3_2

B. Brunk, A User-Centric Privacy Space Framework Security and Usability -Designing Secure Systems that People Can Use, pp.401-420, 2005.

S. Bugiel, L. Davi, A. Dmitrienko, T. Fischer, and A. R. Sadeghi, XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks, 2011.

P. H. Chia, Y. Yamamoto, and N. Asokan, Is this App Safe ? A Large Scale Study on Application Permissions and Risk Signals, Proceedings of WWW 2012, 2012.

G. Chittaranjan, J. Blom, and D. Gatica-perez, Mining large-scale smartphone data for personality studies. Personal and Ubiquitous Computing, 2011.

M. Conti, V. T. Nguyen, and B. Crispo, CRePE: Context-Related Policy Enforcement for Android, ISC'10 Proceedings of the 13th international conference on Information security, pp.331-345, 2010.
DOI : 10.1007/978-3-642-18178-8_29

L. F. Cranor and S. L. Garfinkel, Security and Usability -Designing Secure Systems that People Can Use, 2005.

N. Eagle, A. S. Pentland, and D. Lazer, Inferring Social Network Structure using Mobile Phone Data, Tech. Rep. usually, vol.1, 2009.

M. Egele, C. Kruegel, and E. Kirda, PiOS : Detecting Privacy Leaks in iOS Applications, NDSS 2011 Network and Distributed System Security Symposium Proceedings, 2011.

S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti, Timing is everything?, Proceedings of the 27th international conference on Human factors in computing systems, CHI 09, p.319, 2009.
DOI : 10.1145/1518701.1518752

W. Enck, P. Gilbert, B. G. Chun, L. P. Cox, J. Jung et al., TaintDroid, Proc. of USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2010.
DOI : 10.1145/2619091

W. Enck, M. Ongtang, and P. Mcdaniel, On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, p.235, 2009.
DOI : 10.1145/1653662.1653691

A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, Android permissions demystified, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, p.627, 2011.
DOI : 10.1145/2046707.2046779

A. P. Fuchs and A. Chaudhuri, SCanDroid: Automated Security Certification of Android Applications, Tech. rep., University of Maryland, 2009.

P. Gilbert, B. G. Chun, L. P. Cox, and J. Jung, Vision, Proceedings of the second international workshop on Mobile cloud computing and services, MCS '11, 2011.
DOI : 10.1145/1999732.1999740

URL : https://hal.archives-ouvertes.fr/halshs-00370184

M. C. González, C. Hidalgo, and A. L. Barabási, Understanding individual human mobility patterns, Nature, vol.89, issue.7196, pp.779-82, 2008.
DOI : 10.1038/nature06958

J. I. Hong, An architecture for privacy-sensitive ubiquitous computing, Proceedings of the 2nd international conference on Mobile systems, applications, and services , MobiSYS '04, 2005.
DOI : 10.1145/990064.990087

P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, These aren't the droids you're looking for, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, p.639, 2011.
DOI : 10.1145/2046707.2046780

P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder, A "nutrition label" for privacy, Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS '09, 2009.
DOI : 10.1145/1572532.1572538

P. G. Kelley, S. Consolvo, L. F. Cranor, J. Jung, N. Sadeh et al., A Conundrum of Permissions: Installing Applications on an Android Smartphone, Proceedings of USEC 2012, pp.1-12, 2012.
DOI : 10.1007/978-3-642-34638-5_6

J. R. Kwapisz, G. M. Weiss, and S. A. Moore, Cell phone-based biometric identification, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp.1-7, 2010.
DOI : 10.1109/BTAS.2010.5634532

B. Laugwitz, T. Held, and M. Schrepp, Construction and Evaluation of a User Experience Questionnaire, 2008.
DOI : 10.1207/s15327906mbr0102_10

S. Lederer, A. K. Dey, and J. Mankoff, A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments, Ubiquitous Computing Computer S, 2002.

J. Lin, S. Amini, J. Hong, N. Sadeh, J. Lindqvist et al., Expectation and purpose, Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, 2012.
DOI : 10.1145/2370216.2370290

J. K. Min, J. Wiese, J. I. Hong, and J. Zimmerman, Mining smartphone data to classify life-facets of social relationships, Proceedings of the 2013 conference on Computer supported cooperative work, CSCW '13, p.2013, 2013.
DOI : 10.1145/2441776.2441810

M. Nauman, S. Khan, and X. Zhang, Apex, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.328-332, 2010.
DOI : 10.1145/1755688.1755732

S. Phithakkitnukoon, T. Horanont, D. Lorenzo, G. Shibasaki, R. Ratti et al., Activity-Aware Map: Identifying Human Daily Activity Pattern Using Mobile Phone Data, Human Behavior Understanding, pp.14-25978, 2010.
DOI : 10.1126/science.1177170

A. C. Thampi, M. Johnson, S. Egelman, D. Wagner, and J. King, Path uploads your entire iPhone ad- dress book to its servers path-uploads-your-entire-address-book-to-their-servers When it's better to ask forgiveness than get permission, Proceedings of the Ninth Symposium on Usable Privacy and Security -SOUPS '13, p.1, 2012.

G. M. Weiss and J. W. Lockhart, Identifying user traits by mining smart phone accelerometer data, Proceedings of the Fifth International Workshop on Knowledge Discovery from Sensor Data, SensorKDD '11, pp.61-69, 2011.
DOI : 10.1145/2003653.2003660

Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh, Taming Information-Stealing Smartphone Applications (on Android), Proceedings of the 4th international conference on Trust and trustworthy computing (TRUST'11, pp.93-107, 2011.
DOI : 10.1007/978-3-642-21599-5_7